CN108566389A - A kind of fingerprint identity validation method and device across application - Google Patents

A kind of fingerprint identity validation method and device across application Download PDF

Info

Publication number
CN108566389A
CN108566389A CN201810266176.XA CN201810266176A CN108566389A CN 108566389 A CN108566389 A CN 108566389A CN 201810266176 A CN201810266176 A CN 201810266176A CN 108566389 A CN108566389 A CN 108566389A
Authority
CN
China
Prior art keywords
identity validation
fingerprint identity
finger print
request data
fingerprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810266176.XA
Other languages
Chinese (zh)
Other versions
CN108566389B (en
Inventor
宁泰安
彭正江
杨永
韦明
梁忠
李军战
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN201810266176.XA priority Critical patent/CN108566389B/en
Publication of CN108566389A publication Critical patent/CN108566389A/en
Application granted granted Critical
Publication of CN108566389B publication Critical patent/CN108566389B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a kind of fingerprint identity validation method and devices across application, wherein includes across the fingerprint identity validation method of application:Obtain the fingerprint identity validation request data after ciphering signature;Sign test is carried out to the fingerprint identity validation request data after ciphering signature, determines the legitimacy and integrality of the fingerprint identity validation request data;Under the legitimacy and integrality of the fingerprint identity validation request data, the fingerprint identity validation request data is obtained;Obtain finger print information to be certified;Signature is encrypted to the fingerprint identity validation request data and the finger print information to be certified, fingerprint identity validation is executed under the legitimacy and integrality of data.

Description

A kind of fingerprint identity validation method and device across application
Technical field
This application involves technical field of data processing, more particularly to a kind of fingerprint identity validation method and dress across application It sets.
Background technology
With the fast development of mobile terminal device technology and Internet technology, more and more mobile terminal APP applications In daily life, meets the needs of various aspects such as the financial social activity of people, clothing, food, lodging and transportion -- basic necessities of life, style entertainment.
Currently, most of APP are based primarily upon account+password or cell-phone number+password for the identification of client identity. By industrial and commercial bank release melt e connection for, after client is registered using cell-phone number, be arranged static password, melting e connection APP accounts note Volume link generally can be determined that I operates, but after melting e connection APP logins, as long as client does not exit current account, every time When opening melts e connection APP, system can automated log on operation.And melt e connection APP and apply other than main common function, mostly Number application is to carry out distinctive application exploitation by each branch based on public platform.A set of each branch is supplied to exist due to no The mechanism of authenticating user identification is carried out when developing public platform distinctive application, certain is related to individual privacy in e connection public platforms if melted The characteristic service of information requires only to allow account or cell-phone number that could inquire and operate, as long as then can open Login account melts e connection, and theoretically anyone is it can be seen that relevant information, can also be operated by other people instead of me, Because system can not judge that actual log melts the people that e connection APP is operated according to account and the login situation of password merely Whether must be just client itself, thus will existence information security risk, this information security hidden danger also affect melts e connection APP researches and develops the research and development of more personalized, privacy application scenarios in public platform.
Invention content
The purpose of the application embodiment is to provide a kind of fingerprint identity validation method and device across application, in branch's machine Communication interaction, Trust Establishment, security verification and fingerprint identity validation are carried out between structure application program and finger print identifying server Technical solution, each branch office application only needs to carry out simply to access configuration, and needs according to safety to send symbol Close desired request data, you can the access of finishing device and calling.
To achieve the above object, the application embodiment provides a kind of fingerprint identity validation method across application, including:
Obtain the fingerprint identity validation request data after ciphering signature;
Sign test is carried out to the fingerprint identity validation request data after ciphering signature, determines the fingerprint identity validation number of request According to legitimacy and integrality;
Under the legitimacy and integrality of the fingerprint identity validation request data, the fingerprint identity validation request is obtained Data;
Obtain finger print information to be certified;
Signature is encrypted to the fingerprint identity validation request data and the finger print information to be certified, in data Fingerprint identity validation is executed under legitimacy and integrality.
Preferably, obtain ciphering signature after fingerprint identity validation request data the step of include:
Establish the connection communication with the branch office application;
In communication process, the fingerprint identity validation request after ciphering signature is obtained from the branch office application Data.
Preferably, the step of legitimacy and integrality for determining the fingerprint identity validation request data includes:
The end message for sending fingerprint identity validation request data is obtained, judges whether terminal props up according to the end message Hold finger print identifying;
If terminal supports finger print identifying, judge whether the APP channels of the currently running application program of terminal are legal, such as The APP channels of the currently running application program of fruit are legal, then to the progress of the fingerprint identity validation request data after ciphering signature Sign test;
If sign test success, then it represents that the fingerprint identity validation request data and finger print identifying application program are credible Appoint.
Preferably, the step of obtaining the fingerprint identity validation request data be:
Message decryption is carried out using decipherment algorithm, obtains finger print identifying request data.
Preferably, the step of obtaining finger print information to be certified include:
Inquiry sends the log-on message of the user of the finger print identifying request data, is confirmed whether that there are finger-print ciphers;
If there are finger-print ciphers, finger print information is obtained, and ensures the integrality of the finger print information obtained.
Preferably, include the step of execution fingerprint identity validation under the legitimacy of data and integrality:
After fingerprint identity validation request data sign test success, fingerprint to be certified is obtained from finger print identifying server The authentication result encryption information of information;
Data sign test is carried out to the authentication result encryption information, if sign test success, to authentication result encryption information It is decrypted, obtains finger print identifying as a result, and the finger print identifying result is sent to the branch office application.
To achieve the above object, the application embodiment also provides a kind of fingerprint identity validation device across application, described Device includes:Memory and processor store computer program in the memory, and the computer program is by the processor When execution, following functions are realized:
Obtain the fingerprint identity validation request data after ciphering signature;
Sign test is carried out to the fingerprint identity validation request data after ciphering signature, determines the fingerprint identity validation number of request According to legitimacy and integrality;
Under the legitimacy and integrality of the fingerprint identity validation request data, the fingerprint identity validation request is obtained Data;
Obtain finger print information to be certified;
Signature is encrypted to the fingerprint identity validation request data and the finger print information to be certified, in data Fingerprint identity validation is executed under legitimacy and integrality.
Preferably, the legitimacy and integrality of the fingerprint identity validation request data, the computer program quilt are determined When the processor executes, following functions are realized:
The end message for sending fingerprint identity validation request data is obtained, judges whether terminal props up according to the end message Hold finger print identifying;
If terminal supports finger print identifying, judge whether the APP channels of the currently running application program of terminal are legal, such as The APP channels of the currently running application program of fruit are legal, then to the progress of the fingerprint identity validation request data after ciphering signature Sign test;
If sign test success, then it represents that the fingerprint identity validation request data and finger print identifying application program are credible Appoint.
Preferably, finger print information to be certified is obtained, when the computer program is executed by the processor, is realized following Function:
Inquiry sends the log-on message of the user of the finger print identifying request data, is confirmed whether that there are finger-print ciphers;
If there are finger-print ciphers, finger print information is obtained, and ensures the integrality of the finger print information obtained.
Preferably, fingerprint identity validation is executed under the legitimacy of data and integrality, the computer program is described When processor executes, following functions are realized:
After fingerprint identity validation request data sign test success, fingerprint to be certified is obtained from finger print identifying server The authentication result encryption information of information;
Data sign test is carried out to the authentication result encryption information, if sign test success, to authentication result encryption information It is decrypted, obtains finger print identifying as a result, and the finger print identifying result is sent to the branch office application.
Above-mentioned technical proposal has the advantages that:
The technical program provides a set of signature sign test mechanism, when responding distinctive application program fingerprint certification request, meeting To sending data to carry out legitimacy certification in application program, trusted mechanism is established between application program and fingerprint certification device. When fingerprint certification device sends authenticating transactions toward finger print identifying server, by sign test mechanism of signing, number is sent and returns in guarantee According to legitimacy and integrality, third party's program intercepts and do not distorted.Also, the technical program can be effectively in public platform spy The certain of color application service need to judge when verifying client itself identity, ensure that client personal information can only It is inquired by account and is operated.For each branch, this device can be utilized, develops some with individual character Change, the characteristic service of privacy, it is abundant to melt the e connection more application scenarios of APP.
Description of the drawings
It, below will be to embodiment in order to illustrate more clearly of the application embodiment or technical solution in the prior art Or attached drawing needed to be used in the description of the prior art is briefly described, it should be apparent that, the accompanying drawings in the following description is only It is some embodiments described in the application, for those of ordinary skill in the art, in not making the creative labor property Under the premise of, other drawings may also be obtained based on these drawings.
Fig. 1 is the application schematic diagram of the technical program;
Fig. 2 is that the embodiment of the present application proposes a kind of fingerprint identity validation method flow diagram across application;
Fig. 3 is the structural schematic diagram of the fingerprint identity validation device of the embodiment of the present application;
Fig. 4 is the program flow diagram of the technical program in practical applications;
Fig. 5 is a kind of fingerprint identity validation schematic device across application that the embodiment of the present application proposes.
Specific implementation mode
In order to make those skilled in the art better understand the technical solutions in the application, below in conjunction with the application reality The attached drawing in mode is applied, the technical solution in the application embodiment is clearly and completely described, it is clear that described Embodiment is only a part of embodiment of the application, rather than whole embodiments.Based on the embodiment party in the application Formula, every other embodiment obtained by those of ordinary skill in the art without making creative efforts, is all answered When the range for belonging to the application protection.
As shown in Figure 1, for the application schematic diagram of the technical program.The technology that the technical program is related to enterprise headquarters' level is real It is now called with the access of branch level, specifically technical solution includes at least following feature:
(1) mobile terminal 4 with fingerprint acquisition device:The terminal includes the smart mobile phone used on the market at present, tablet Computer etc., user can be installed using the mobile terminal and e connection APP are melted in operation, and support fingerprint typing;
(2) finger print identifying server 1:The server disposition is in enterprise headquarters, for responding fingerprint identity validation device The finger print identifying request sent, server can carry out legitimacy and integrity checking to the request data of fingerprint certification device, check Finger print identifying can be completed after, and gives the ciphering signature data back of authentication result to fingerprint identity validation device;
(3) APP host servers 2:The server disposition is responsible for melting every enterprise headquarters layer of e connection APP in enterprise headquarters The Batch Processing of face application function is handled;
(4) application server 3:The server disposition is in branch, the distinctive application for handling branch's exploitation The Batch Processing of program local application function is handled, and provides report data support etc. for business department;
(5) branch office application 8:Branch office application is by each branch according to local characteristic service demand Exploitation is supplied to client to use in the form of melting e connection public platform services;
(6) fingerprint identity validation device 9:Since present intelligent mobile terminal all supports fingerprint recognition, Ke Hu substantially I manages it when melting e connection APP registrations, other than static login password can be arranged, can also in addition select finger print information typing, allow finger Line information and customer accounting code are associated.
Enterprise headquarters' level provides a set of fingerprint identity validation device to each branch and is accessed and called.From technology For angle, fingerprint identity validation device 9 is a set of open type software development kit being packaged based on SDK technologies (SDK), the SDK is by the api interface set of completion fingerprint identity validation function and relevant configuration file and other backmans Tool is constituted.When the page of branch office application 8 needs that the fingerprint identity validation device is called to carry out fingerprint identity validation, Enterprise headquarters' level needs first answer the APPID of program and the api interface of required calling to bind branch, make branch Mechanism application program 8 possesses the permission for accessing API, while the application program 8 of branch needs to introduce fingerprint identity validation SDK Packet, and relevant parameter configuration is carried out, and api interface calling is carried out according to the flow of fingerprint identity validation, above send each interface needs Parameter, since above step is standard configuration flow, which is not described herein again.This material introduces fingerprint identity validation dress Set each interface mould completed branch office application calling fingerprint identity validation device and be finally completed fingerprint identity validation Logical relation between the function of block and each function module.
In addition, fingerprint identity validation device need establish and branch office application between and with finger print identifying service Trusted relationships between device, this trusted relationships are realized using the mechanism that ciphering signature and sign test are decrypted.In order to establish branch Trusted relationships between mechanism application program, fingerprint identity validation device and fingerprint identity validation server three, need to set Two sets of public and private keys carry out data in fingerprint identity validation device and branch office application and fingerprint identity validation server When interaction, it is required for agreement encrypting and decrypting and the algorithm for sign test of signing, ensures the legitimacy of request and return data and complete Property.
Specifically, when certain business in branch's distinctive application program need that enterprise headquarters' Fingerprint Identity is called to recognize When client itself identity is identified in card device, label can be encrypted in the request data sent in branch's distinctive application program Name, fingerprint identity validation device determine the legitimacy and integrality of data, that is, establish trusted relationships, journey after sign test is decrypted Sequence will arouse fingerprint identity validation interface, and after client presses fingerprint, fingerprint identity validation device can send fingerprint to recognize by again Signature is encrypted in the request data of card server, establishes credible between fingerprint identity validation device and finger print identifying server Relationship, system can go up the corresponding personal account information of the host query fingerprint, and personal account corresponding with e connection login accounts are melted is believed Whether breath is consistent, determines whether that the people of operation is client itself, is operated into next step.It is carried out in finger print identifying server When authentication result is back to branch office application by data back to fingerprint certification device and fingerprint certification device, equally Also it can establish triangular trusted relationships by the way of reverse encryption signature and sign test decryption, ensure the legal of data transmission Property and integrality.
Based on foregoing description, as shown in Fig. 2, proposing a kind of fingerprint identity validation method across application for the embodiment of the present application Flow chart.Including:
Step 201):Obtain the fingerprint identity validation request data after ciphering signature.
In the present embodiment, obtain ciphering signature after fingerprint identity validation request data the step of include:
Establish the connection communication with the branch office application;
In communication process, the fingerprint identity validation request after ciphering signature is obtained from the branch office application Data.
Step 202):Sign test is carried out to the fingerprint identity validation request data after ciphering signature, determines the Fingerprint Identity The legitimacy and integrality of certification request data.
In the present embodiment, the step of legitimacy and integrality for determining the fingerprint identity validation request data includes:
The end message for sending fingerprint identity validation request data is obtained, judges whether terminal props up according to the end message Hold finger print identifying;
If terminal supports finger print identifying, judge whether the APP channels of the currently running application program of terminal are legal, such as The APP channels of the currently running application program of fruit are legal, then to the progress of the fingerprint identity validation request data after ciphering signature Sign test;
If sign test success, then it represents that the fingerprint identity validation request data and finger print identifying application program are credible Appoint.
Step 203):Under the legitimacy and integrality of the fingerprint identity validation request data, the fingerprint body is obtained Part certification request data.
In the present embodiment, message decryption is carried out using decipherment algorithm, obtains finger print identifying request data.
Step 204):Obtain finger print information to be certified.
In the present embodiment, the step of obtaining finger print information to be certified include:
Inquiry sends the log-on message of the user of the finger print identifying request data, is confirmed whether that there are finger-print ciphers;
If there are finger-print ciphers, finger print information is obtained, and ensures the integrality of the finger print information obtained.
Step 205):Label are encrypted to the fingerprint identity validation request data and the finger print information to be certified Name, fingerprint identity validation is executed under the legitimacy and integrality of data.
In the present embodiment, include the step of execution fingerprint identity validation under the legitimacy of data and integrality:
After fingerprint identity validation request data sign test success, fingerprint to be certified is obtained from finger print identifying server The authentication result encryption information of information;
Data sign test is carried out to the authentication result encryption information, if sign test success, to authentication result encryption information It is decrypted, obtains finger print identifying as a result, and the finger print identifying result is sent to the branch office application.
To make the purpose, technical scheme and advantage of the technical program be more clearly understood, below in conjunction with specific embodiment, and With reference to attached drawing, the present apparatus and method are further described.
As shown in Figure 1, melting e connection APP7 is functionally equivalent to a client browser, it is responsible for showing branch The interactive interface of application program 8 (one or more) and fingerprint identity validation device 9 is user and branch office application 8 The interaction channel of one data inputting and data output is provided between (one or more) and fingerprint identity validation device 9.
It is a software development in technology realization, it is with development kit for fingerprint identity validation device 9 The mode of SDK is supplied to each branch when developing characteristic branch office application 8 in melting e connection APP 7 by enterprise headquarters Access and calling.The data interaction of fingerprint identity validation device 9 and mobile terminal 4 is mainly responsible for acquisition mobile terminal hardware and sets Standby related data, judges whether the mobile terminal 4 supports fingerprint function.Fingerprint identity validation device 9 and fingerprint acquisition device 6 Data interaction, be mainly responsible for acquisition user fingerprints information.Fingerprint identity validation device 9 and the data interaction for melting e connection APP 7, The channel data and APP user data for obtaining and melting e connection APP are mainly responsible for, the acquisition of channel data is closed for checking that channel calls Method will be unable to call fingerprint identity validation work(if branch office application is run on melting e connection APP7 channels Can, APP user data judge user whether there are finger-print cipher, whether match fingerprint and user account consistent etc..Fingerprint Identity The data interaction of authentication device 9 and branch office application 8 is mainly responsible for response branch office application 8 and calls fingerprint The request of identification authentication system 9 obtains the ciphering signature data that branch office application 8 uploads, line program legitimacy of going forward side by side It checks, establishes trusted relationships between the two, after the completion of fingerprint identity validation, authentication result can be returned to branch's machine by device 9 Structure application program 8 is illustrated in and melts on the interfaces e connection APP7, and shows result on screen 5.
The background process of fingerprint identity validation, by fingerprint identity validation device 9 sending fingerprint identity validation in authentication data Server 1 is completed, and the request response between fingerprint identity validation device 9 and fingerprint identity validation server 1 is directed to signature and recognizes Card mechanism establishes the credible of fingerprint identity validation device 9 and finger print identifying server 1 by ciphering signature and sign test decryption mechanisms Relationship ensures the legitimacy of certification request and the integrality of data.
For branch office application 8, the localization of branch office application 8 (including one or more) Consistency operation is completed by corresponding application server 3, and branch office application 8 needs host to complete the function of merchandising, by Branch office application 8 and melt e connection APP 7 carry out data interaction, act on behalf of forward by way of on send melt e join APP hosts Server 2 is completed.
As shown in figure 3, the structural schematic diagram of the fingerprint identity validation device for the embodiment of the present application.It is described in detail below:
(1) fingerprint identity validation device 9 is by interactive controlling module a1, information security module b1 and fingerprint authentication module c1 structures At.
(2) interactive controlling module a1 is responsible for making requests between fingerprint identity validation device 9 and branch office application 8 Response, data interaction and authentication result passback;Information security module b1 is responsible for completing to application program, fingerprint identity validation mould Safety inspection between block and background process three and establishing is trusted, and prevents when carrying out finger print identifying appearance by third equation The case where sequence is kidnapped or data are tampered;Fingerprint authentication module c1 is responsible for completing the backstage of fingerprint collecting and fingerprint identity validation Processing.
(3) interactive controlling module a1 includes:Process communication unit a12, data processing unit a13, Logical processing unit a14 With result back propagation unit a15, the concrete function of wherein each unit is described as follows:Process communication unit a12 completes branch and answers The request response that fingerprint identity validation device 9 is called with program 8, establishes branch office application 8 and fingerprint identity validation dress Set 9 communication process.Data processing unit a13 is responsible for two parts data processing, first, the request to branch office application 8 Data are handled, after process communication unit a12 establishes calling process, by the procedural legality of sign test decryption unit b12 After certification, data processing unit a13 can obtain the request clear data after decryption, and be converted to and subsequently do required for finger print identifying Data format, second is that after finger print identifying unit c15 completes finger print identifying operation, by sign test decryption unit b12 to backstage After the result data of passback carries out data validity checking, data processing unit a13 can obtain the result clear data after decryption, And be converted to the data type needed for distinctive application program.As a result back propagation unit a15 is responsible for transformed result data to unite One data format returns to distinctive application program and is shown.Logical processing unit a14 is responsible for completing one before finger print identifying A little logic functions judgements, including:Whether whether mobile terminal support fingerprint collecting, user when APP is registered there are finger-print cipher, Whether distinctive application PROGRAMMED REQUESTS is legitimate request etc..
(4) information security module b1 includes:Sign test decryption unit b12 and ciphering signature unit b13, the wherein tool of each unit Body function is described as follows:Sign test decryption unit b12 is responsible for carrying out data validation to two parts data, first, answering characteristic It being authenticated with the signed data sent in program, it is ensured that the application program for initiating request is legal, and data are complete, second is that Data validation is carried out to the authentication result data of finger print identifying server, ensures that host return data is not tampered with. Ciphering signature unit b13 is mainly responsible for above sending the request data of fingerprint identity validation server that signature processing, packet is encrypted The data such as finger print information and user information are included, are ensured when fingerprint identity validation device does authenticating transactions toward background server, number It is distorted according to not being intercepted by a third party.
(5) fingerprint authentication module c1 includes:Finger print identifying interface c12, fingerprint acquiring unit c13, fingerprint pretreatment unit C14, finger print identifying unit c15, the concrete function of wherein each unit are described as follows:Branch office application 8 arouses fingerprint body After the finger print identifying interface c12 of part authentication device, show that a prompt user carries out the interface of fingerprint typing.Fingerprint acquiring unit C13 is responsible for obtaining the finger print information of user's typing, and finger print information is transmitted to fingerprint pretreatment unit c14 processing.Fingerprint Pretreatment unit c14 is responsible for checking the integrality of finger print information, if the fingerprint of user's typing is imperfect, return refers to Line authentication interface c12, allows user to re-type.Finger print identifying unit c15 above send the data after b13 ciphering signatures to fingerprint Authentication carries out backstage authentication operation.
As shown in figure 4, being the program flow diagram of the technical program in practical applications.With melt e join APP application program be Example, the flow that branch office application 8 calls enterprise headquarters' fingerprint identity validation device 9 to complete user fingerprints authentication have Body is described as:
Step 101:The data that fingerprint identity validation is asked are encrypted branch office application 8 (one or more) After signature, finger print identifying request is initiated to fingerprint identity validation device 9;
Step 102:The process communication unit a12 of interactive controlling module a1, the finger print identifying request of customer in response end program, Establish process communication;
Step 103:The data processing unit a13 of interactive controlling module a1 obtains mobile terminal relevant information, and by logic Processing unit a4 judges whether support finger print identifying, if it does not, then finger print identifying fails, as a result back propagation unit a15 will lose Information back is lost to branch office application 8, and in interface display, if mobile terminal supports fingerprint function, under entering One step judges;
Step 104:The data processing unit a13 of interactive controlling module a1 obtains the built-in browser information of current APP, and Judge whether the APP channels that current branch mechanism application program 8 is run are to melt e to join APP by Logical processing unit a14, if not It is the api interface for not allowing then branch office application 8 to call fingerprint identity validation device 9, finger print identifying fails, as a result Failure information is returned to branch office application 8 by back propagation unit a5, and in interface display, if it is, entering in next step Judge;
Step 105:The sign test decryption unit b12 of information security module b1 is to the fingerprint that is sent on branch office application 8 Authentication signature data carry out sign test, if sign test fails, then it represents that the data that branch office application 8 is asked are illegal, refer to Line authentification failure, as a result failure information is returned to branch office application 8 by back propagation unit a15, if sign test success, indicates The data that branch office application 8 is asked are legal, call 8 He of branch office application of fingerprint certification device correlation API On the authentication data sent be trusty, operated into next step;
Step 106:The sign test decryption unit b12 of information security module b1 is after sign test success, data processing unit a13 profits Message decryption is carried out with decipherment algorithm, obtains finger print identifying request data;
Step 107:The Logical processing unit a14 of interactive controlling module a1 according to user fingerprints certification request relevant parameter, To APP host servers 2, the user is inquired when registering APP accounts, if there are finger-print ciphers, if not staying finger-print cipher, Then finger print identifying fails, if there are finger-print cipher, does and operates in next step;
Step 108:After all logic judgments in front all pass through, fingerprint authentication module c1 arouses finger print identifying interface c12, It is shown in mobile terminal screen 5;
Step 109:Finger print identifying interface c12 waits for user fingerprints typing, user to be filled by the fingerprint collecting of mobile terminal Set 6, press fingerprint, fingerprint acquiring unit c13 obtains finger print information from mobile terminal 4, give fingerprint pretreatment unit c14 into Row processing;
Step 110:The fingerprint pretreatment unit c14 of fingerprint authentication module c1 carries out finger print information integrity checking, judges Whether fingerprint typing is complete, and interface is returned to if imperfect, and user is prompted to press fingerprint again, if finger print information is complete, It is operated into next step;
Step 111:Label are encrypted in request data and finger print information by the finger print identifying unit c15 of fingerprint authentication module c1 Name, and will be given in the request data after ciphering signature to finger print identifying server 1;
Step 112:Finger print identifying server 1 first carries out sign test to the request data sent on fingerprint identity validation device 9, sentences Disconnected data validation, if sign test fails, finger print identifying failure, and error message is returned, if sign test success, entrance are next Step operation;
Step 113:If the success of 1 sign test of finger print identifying server, recognizes the fingerprint sent on fingerprint identity validation device 9 Card request carries out fingerprint identity validation, and authentication result is returned fingerprint identity validation device 9;
Step 114:The data processing unit a13 of interactive controlling module a1 obtains the certification of 1 passback of Fingerprint Identity server Result data, and sign test decryption unit b12 is transferred to carry out data sign test;
Step 115:If sign test fails, indicate that data are illegal, in fact it could happen that data are tampered or data are not come From finger print identifying server 1, finger print identifying failure is done if sign test success and is operated in next step;
Step 116:After sign test success, encryption data is decrypted in sign test decryption unit b12, obtains finger print identifying result Data, and authentication result is transmitted to branch office application 8 by result back propagation unit a15;
Step 117:After branch office application 8 obtains authentication result, judge whether authentication result mark is success, such as Fruit authentication result mark is failure, then entire finger print identifying failure, if authentication result mark is successfully, entire finger print identifying Success, branch office application 8 can carry out next step operation.
As shown in figure 5, a kind of fingerprint identity validation schematic device across application proposed for the embodiment of the present application.It is described Device includes:Computer program is stored in memory a and processor b, the memory a, the computer program is by the place When managing device b execution, following functions are realized:
Obtain the fingerprint identity validation request data after ciphering signature;
Sign test is carried out to the fingerprint identity validation request data after ciphering signature, determines the fingerprint identity validation number of request According to legitimacy and integrality;
Under the legitimacy and integrality of the fingerprint identity validation request data, the fingerprint identity validation request is obtained Data;
Obtain finger print information to be certified;
Signature is encrypted to the fingerprint identity validation request data and the finger print information to be certified, in data Fingerprint identity validation is executed under legitimacy and integrality.
In the present embodiment, the legitimacy and integrality of the fingerprint identity validation request data, the computer are determined When program is executed by the processor b, following functions are realized:
The end message for sending fingerprint identity validation request data is obtained, judges whether terminal props up according to the end message Hold finger print identifying;
If terminal supports finger print identifying, judge whether the APP channels of the currently running application program of terminal are legal, such as The APP channels of the currently running application program of fruit are legal, then to the progress of the fingerprint identity validation request data after ciphering signature Sign test;
If sign test success, then it represents that the fingerprint identity validation request data and finger print identifying application program are credible Appoint.
In the present embodiment, finger print information to be certified is obtained, when the computer program is executed by the processor b, Realize following functions:
Inquiry sends the log-on message of the user of the finger print identifying request data, is confirmed whether that there are finger-print ciphers;
If there are finger-print ciphers, finger print information is obtained, and ensures the integrality of the finger print information obtained.
In the present embodiment, fingerprint identity validation, the computer program are executed under the legitimacy of data and integrality When being executed by the processor b, following functions are realized:
After fingerprint identity validation request data sign test success, fingerprint to be certified is obtained from finger print identifying server The authentication result encryption information of information;
Data sign test is carried out to the authentication result encryption information, if sign test success, to authentication result encryption information It is decrypted, obtains finger print identifying as a result, and the finger print identifying result is sent to the branch office application.
The technical program takes full advantage of industrial and commercial bank in the technical advantage in finger print identifying field, is applied for each branch Program provides a set of fingerprint identity validation function of can be used for melting and be called when e connection APP progress distinctive application exploitations, the technical side The major advantage of case is shown as:
(1) using simple:It is supplied since enterprise headquarters' level provides a set of fingerprint identity validation device based on SDK frames Branch calls, and branch is in use, need to only do easy configuration and according to sending correct data complete on interface specification At calling.
(2) safe:Since fingerprint identity validation device provides a set of signature sign test mechanism, in response distinctive application When program fingerprint certification request, it can be filled in application program and finger print identifying to sending data to carry out legitimacy certification in application program Trusted mechanism is established between setting.When fingerprint certification device sends authenticating transactions toward finger print identifying server, pass through sign test of signing Mechanism send legitimacy and integrality with returned data in guarantee, not by third party's program intercepts and distorts.
(3) easy to operate:Fingerprint identity validation device can be presented in logic verify and the data processing for doing some from the background Only a fingerprint input interface and the verification result of user, is not necessarily to other extra operations.
(4) expansion is good:Since fingerprint identity validation device can be effectively in certain need of public platform distinctive application service Judge when verification to client itself identity, ensures that client personal information can only be inquired by account And operation.For each branch, this device can be utilized, developing some has personalized, privacy characteristic industry Business, it is abundant to melt the e connection more application scenarios of APP.
In the present embodiment, the memory includes but not limited to random access memory (Random Access Memory, RAM), read-only memory (Read-Only Memory, ROM), caching (Cache), hard disk (Hard Disk Drive, HDD) or storage card (Memory Card).
In the present embodiment, the processor can be implemented in any suitable manner.For example, the processor can be with Take such as microprocessor or processor and storage can by computer readable program code that (micro-) processor executes (such as Software or firmware) computer-readable medium, logic gate, switch, application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), the form etc. of programmable logic controller (PLC) and embedded microcontroller.
What the fingerprint identity validation method across application that this specification embodiment provides, memory and processor were realized Concrete function can contrast explanation with the aforementioned embodiments in this specification, and can reach the skill of aforementioned embodiments Art effect, just repeats no more here.
In the 1990s, the improvement of a technology can be distinguished clearly be on hardware improvement (for example, Improvement to circuit structures such as diode, transistor, switches) or software on improvement (improvement for method flow).So And with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit. Designer nearly all obtains corresponding hardware circuit by the way that improved method flow to be programmed into hardware circuit.Cause This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, programmable logic device (Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate Array, FPGA)) it is exactly such a integrated circuit, logic function determines device programming by user.By designer Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, designs and makes without asking chip maker Dedicated IC chip.Moreover, nowadays, substitution manually makes IC chip, this programming is also used instead mostly " patrols Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development, And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language (Hardware Description Language, HDL), and HDL is also not only a kind of, but there are many kind, such as ABEL (Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL (Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language) etc., VHDL (Very-High-Speed are most generally used at present Integrated Circuit Hardware Description Language) and Verilog2.Those skilled in the art It will be apparent to the skilled artisan that only needing method flow slightly programming in logic and being programmed into integrated circuit with above-mentioned several hardware description languages In, so that it may to be readily available the hardware circuit for realizing the logical method flow.
It is also known in the art that in addition to realizing client, server in a manner of pure computer readable program code In addition, completely can by by method and step carry out programming in logic come so that client, server with logic gate, switch, special The form of integrated circuit, programmable logic controller (PLC) and embedded microcontroller etc. realizes identical function.Therefore this client, Server is considered a kind of hardware component, and can also be regarded to the device for realizing various functions that its inside includes For the structure in hardware component.Or even, can will be considered as either implementation method for realizing the device of various functions Software module can be structure in hardware component again.
As seen through the above description of the embodiments, those skilled in the art can be understood that the application can It is realized by the mode of software plus required general hardware platform.Based on this understanding, the technical solution essence of the application On in other words the part that contributes to existing technology can be expressed in the form of software products, the computer software product It can be stored in a storage medium, such as ROM/RAM, magnetic disc, CD, including some instructions are used so that a computer equipment (can be personal computer, server either network equipment etc.) executes each embodiment of the application or embodiment Method described in certain parts.
Each embodiment in this specification is described in a progressive manner, identical similar between each embodiment Just to refer each other for part, what each embodiment stressed is the difference with other embodiment.In particular, needle For the embodiment of client, the introduction control for being referred to the embodiment of preceding method is explained.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program Module.Usually, program module includes routines performing specific tasks or implementing specific abstract data types, program, object, group Part, data structure etc..The application can also be put into practice in a distributed computing environment, in these distributed computing environments, by Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with In the local and remote computer storage media including storage device.
Although depicting the application by embodiment, it will be appreciated by the skilled addressee that there are many deformations by the application With variation without departing from spirit herein, it is desirable to which the attached claims include these deformations and change without departing from the application Spirit.

Claims (10)

1. a kind of fingerprint identity validation method across application, which is characterized in that including:
Obtain the fingerprint identity validation request data after ciphering signature;
Sign test is carried out to the fingerprint identity validation request data after ciphering signature, determines the fingerprint identity validation request data Legitimacy and integrality;
Under the legitimacy and integrality of the fingerprint identity validation request data, the fingerprint identity validation number of request is obtained According to;
Obtain finger print information to be certified;
Signature is encrypted to the fingerprint identity validation request data and the finger print information to be certified, in the legal of data Fingerprint identity validation is executed under property and integrality.
2. the method as described in claim 1, which is characterized in that obtain the fingerprint identity validation request data after ciphering signature Step includes:
Establish the connection communication with branch office application;
In communication process, the fingerprint identity validation number of request after ciphering signature is obtained from the branch office application According to.
3. the method as described in claim 1, which is characterized in that determine the fingerprint identity validation request data legitimacy and The step of integrality includes:
The end message for sending fingerprint identity validation request data is obtained, judges whether terminal is supported to refer to according to the end message Line certification;
If terminal supports finger print identifying, judge whether the APP channels of the currently running application program of terminal are legal, if worked as The APP channels of the application program of preceding operation are legal, then to the carry out sign test of the fingerprint identity validation request data after ciphering signature;
If sign test success, then it represents that the fingerprint identity validation request data and the equal trusted of finger print identifying application program.
4. the method as described in claim 1, which is characterized in that the step of obtaining the fingerprint identity validation request data be:
Message decryption is carried out using decipherment algorithm, obtains finger print identifying request data.
5. method as claimed in claim 3, which is characterized in that the step of obtaining finger print information to be certified include:
Inquiry sends the log-on message of the user of the finger print identifying request data, is confirmed whether that there are finger-print ciphers;
If there are finger-print ciphers, finger print information is obtained, and ensures the integrality of the finger print information obtained.
6. method as claimed in claim 5, which is characterized in that execute Fingerprint Identity under the legitimacy and integrality of data and recognize The step of card includes:
After fingerprint identity validation request data sign test success, finger print information to be certified is obtained from finger print identifying server Authentication result encryption information;
Data sign test is carried out to the authentication result encryption information, if sign test success, carries out authentication result encryption information Decryption obtains finger print identifying as a result, and the finger print identifying result is sent to branch office application.
7. a kind of fingerprint identity validation device across application, which is characterized in that described device includes:Memory and processor, institute It states and stores computer program in memory, when the computer program is executed by the processor, realize following functions:
Obtain the fingerprint identity validation request data after ciphering signature;
Sign test is carried out to the fingerprint identity validation request data after ciphering signature, determines the fingerprint identity validation request data Legitimacy and integrality;
Under the legitimacy and integrality of the fingerprint identity validation request data, the fingerprint identity validation number of request is obtained According to;
Obtain finger print information to be certified;
Signature is encrypted to the fingerprint identity validation request data and the finger print information to be certified, in the legal of data Fingerprint identity validation is executed under property and integrality.
8. device as claimed in claim 7, which is characterized in that determine the fingerprint identity validation request data legitimacy and Integrality when the computer program is executed by the processor, realizes following functions:
The end message for sending fingerprint identity validation request data is obtained, judges whether terminal is supported to refer to according to the end message Line certification;
If terminal supports finger print identifying, judge whether the APP channels of the currently running application program of terminal are legal, if worked as The APP channels of the application program of preceding operation are legal, then to the carry out sign test of the fingerprint identity validation request data after ciphering signature;
If sign test success, then it represents that the fingerprint identity validation request data and the equal trusted of finger print identifying application program.
9. device as claimed in claim 8, which is characterized in that obtain finger print information to be certified, the computer program quilt When the processor executes, following functions are realized:
Inquiry sends the log-on message of the user of the finger print identifying request data, is confirmed whether that there are finger-print ciphers;
If there are finger-print ciphers, finger print information is obtained, and ensures the integrality of the finger print information obtained.
10. device as claimed in claim 9, which is characterized in that execute Fingerprint Identity under the legitimacy and integrality of data Certification when the computer program is executed by the processor, realizes following functions:
After fingerprint identity validation request data sign test success, finger print information to be certified is obtained from finger print identifying server Authentication result encryption information;
Data sign test is carried out to the authentication result encryption information, if sign test success, carries out authentication result encryption information Decryption obtains finger print identifying as a result, and the finger print identifying result is sent to branch office application.
CN201810266176.XA 2018-03-28 2018-03-28 Cross-application fingerprint identity authentication method and device Active CN108566389B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810266176.XA CN108566389B (en) 2018-03-28 2018-03-28 Cross-application fingerprint identity authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810266176.XA CN108566389B (en) 2018-03-28 2018-03-28 Cross-application fingerprint identity authentication method and device

Publications (2)

Publication Number Publication Date
CN108566389A true CN108566389A (en) 2018-09-21
CN108566389B CN108566389B (en) 2021-02-23

Family

ID=63533148

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810266176.XA Active CN108566389B (en) 2018-03-28 2018-03-28 Cross-application fingerprint identity authentication method and device

Country Status (1)

Country Link
CN (1) CN108566389B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110308955A (en) * 2019-06-05 2019-10-08 阿里巴巴集团控股有限公司 A kind of interface call method, system and equipment
CN110636498A (en) * 2019-11-08 2019-12-31 国网电子商务有限公司 Identity authentication method and device of mobile terminal based on network electronic identity
CN111542050A (en) * 2020-03-27 2020-08-14 广西东信易联科技有限公司 TEE-based method for guaranteeing remote initialization safety of virtual SIM card

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1674501A (en) * 2005-03-23 2005-09-28 西安青松科技股份有限公司 File enciphered signature system based on fingerprint and realizing method thereof
CN104134030A (en) * 2014-07-31 2014-11-05 中山市品汇创新专利技术开发有限公司 E-bank safety certification method based on living fingerprint verification
CN106411533A (en) * 2016-11-10 2017-02-15 西安电子科技大学 On-line fingerprint authentication system and method based on bidirectional privacy protection
CN106899552A (en) * 2015-12-21 2017-06-27 中国电信股份有限公司 Authentication method, certification terminal and system
CN107196901A (en) * 2017-03-30 2017-09-22 阿里巴巴集团控股有限公司 A kind of identity registration and the method and device of certification
CN107257336A (en) * 2017-06-15 2017-10-17 北京汇通金财信息科技有限公司 A kind of user authen method and system
CN107316381A (en) * 2016-09-29 2017-11-03 中国工商银行股份有限公司 A kind of sales counter information processing method, terminal and business handling system
CN107395589A (en) * 2017-07-18 2017-11-24 深圳市金立通信设备有限公司 Finger print information acquisition methods and terminal
US20180054312A1 (en) * 2016-08-22 2018-02-22 Mastercard International Incorporated Method and system for secure fido development kit with embedded hardware

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1674501A (en) * 2005-03-23 2005-09-28 西安青松科技股份有限公司 File enciphered signature system based on fingerprint and realizing method thereof
CN104134030A (en) * 2014-07-31 2014-11-05 中山市品汇创新专利技术开发有限公司 E-bank safety certification method based on living fingerprint verification
CN106899552A (en) * 2015-12-21 2017-06-27 中国电信股份有限公司 Authentication method, certification terminal and system
US20180054312A1 (en) * 2016-08-22 2018-02-22 Mastercard International Incorporated Method and system for secure fido development kit with embedded hardware
CN107316381A (en) * 2016-09-29 2017-11-03 中国工商银行股份有限公司 A kind of sales counter information processing method, terminal and business handling system
CN106411533A (en) * 2016-11-10 2017-02-15 西安电子科技大学 On-line fingerprint authentication system and method based on bidirectional privacy protection
CN107196901A (en) * 2017-03-30 2017-09-22 阿里巴巴集团控股有限公司 A kind of identity registration and the method and device of certification
CN107257336A (en) * 2017-06-15 2017-10-17 北京汇通金财信息科技有限公司 A kind of user authen method and system
CN107395589A (en) * 2017-07-18 2017-11-24 深圳市金立通信设备有限公司 Finger print information acquisition methods and terminal

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110308955A (en) * 2019-06-05 2019-10-08 阿里巴巴集团控股有限公司 A kind of interface call method, system and equipment
CN110308955B (en) * 2019-06-05 2023-03-31 创新先进技术有限公司 Interface calling method, system and equipment
CN110636498A (en) * 2019-11-08 2019-12-31 国网电子商务有限公司 Identity authentication method and device of mobile terminal based on network electronic identity
CN111542050A (en) * 2020-03-27 2020-08-14 广西东信易联科技有限公司 TEE-based method for guaranteeing remote initialization safety of virtual SIM card
CN111542050B (en) * 2020-03-27 2021-05-18 广西东信易联科技有限公司 TEE-based method for guaranteeing remote initialization safety of virtual SIM card

Also Published As

Publication number Publication date
CN108566389B (en) 2021-02-23

Similar Documents

Publication Publication Date Title
AU2022206815B2 (en) Universal digital identity authentication service
US20240104567A1 (en) System and method linking to accounts using credential-less authentication
TW201741922A (en) Biological feature based safety certification method and device
CN108684041A (en) The system and method for login authentication
US11588638B2 (en) Digital notarization using a biometric identification service
JP2014529964A (en) System and method for secure transaction processing via a mobile device
US20200196143A1 (en) Public key-based service authentication method and system
US11824850B2 (en) Systems and methods for securing login access
CN111832005B (en) Application authorization method, application authorization device and electronic equipment
CN107196943B (en) A kind of security display implementation method of private data in third-party platform
US20240195633A1 (en) Call center web-based authentication using a contactless card
US20200410494A1 (en) Systems and Methods of Electronic Identity Verification
JP2024079694A (en) System and method for pre-authentication of customer support calls - Patents.com
CN110247758A (en) The method, apparatus and code management device of Password Management
CN108566389A (en) A kind of fingerprint identity validation method and device across application
CN106453273B (en) A kind of information insurance management system and method based on cloud
KR102123405B1 (en) System and method for providing security membership and login hosting service
KR20130048532A (en) Next generation financial system
US20200204377A1 (en) Digital notarization station that uses a biometric identification service
CN106534047A (en) Information transmitting method and apparatus based on Trust application
TWM583082U (en) User identity verification system for safety transaction environment
Agwanyanjaba Enhanced Mobile Banking Security: Implementing Transaction Authorization Mechanism Via USSD Push.
CN113645239B (en) Application login method and device, user terminal and storage medium
CN114428970A (en) Service calling method, terminal device, server and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant